| Summary: | umask setting in sshd | ||
|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | Leo Baltus <leo.baltus> |
| Component: | sshd | Assignee: | Assigned to nobody <unassigned-bugs> |
| Status: | CLOSED WONTFIX | ||
| Severity: | normal | CC: | djm, dtucker |
| Priority: | P2 | ||
| Version: | 5.2p1 | ||
| Hardware: | All | ||
| OS: | All | ||
|
Description
Leo Baltus
2009-04-02 18:50:59 AEDT
What behaviour are you are expecting and what is this breaking for you? Hi Damien, I am expecting to either have a umask setting in the configuration file, or, even better, to not change the umask so sshd will use the umask from the session that started it. On certain uploadservers we would like users to have a umask 002 by default. so that uploaded files from, say, windows will have group write permission. These users are often collaborating with others and have no clue about permissions. The current behaviour is a hard change in the software and no means to change it in configuration, that's an unfortunate combination. (In reply to comment #2) > On certain uploadservers we would like users to have a umask 002 by > default. so that uploaded files from, say, windows will have group > write permission. These users are often collaborating with others and > have no clue about permissions. So you're talking about the umask of the eventual user's shell? or an sftp-only session? Can you set it in whatever shell startup you have? The reason for the change was that the sshd server itself could also create world writeable files when started with a permissive umask (eg the sshd.pid file). If it is sftp and you're using the external sftp server you could work around it by pointing "Subsystem sftp" in sshd_config to a shell wrapper that just sets the umask and execs the real sftp-server. I am talking about both shell and sftp sessions. If a permissive umask would result in a writable pid file, then I feel the problem is with the umask and not with opensshd. OpenSSH 5.4 will include an option to set an explicit umask for sftp sessions and there are a number of ways that a user may control their umask for shell/scp sessions (shell init files, PAM, etc.) We really don't want sshd to run with a loose or non-deterministic umask, so I think this bug can be closed. Mass move of bugs RESOLVED->CLOSED following the release of openssh-5.5p1 |